FB pixel

Biometric-bound credentials take stage at EAB talk from Trust Stamp’s CSO

Secrets abound in breakdown of key-based biometric cryptosystems
Categories Biometric R&D  |  Biometrics News
Biometric-bound credentials take stage at EAB talk from Trust Stamp’s CSO
 

The latest EAB Member Lunch Talk from the European Association for Biometrics features Dr. Norman Poh, chief science for Trust Stamp, who speaks on the topic of biometric-bound credentials and how they enable zero knowledge proof (ZKP) applications.

Poh defines binding as the process of capturing a biometric sample, “generating an internal secret and using that secret to encrypt an external secret.” Likewise, unbinding is when the secret is decrypted as part of the verification flow. The goal, he says, is to “bind your face to an external secret” – or private key – so that biometric data is linked directly to cryptographic credentials.

“Effectively,” he says, “you are your authenticator.”

Pho says the process also generates a data package called a sketch, which is needed to later reconstruct the internal secret once the algorithm receives another biometric capture of the same individual. This packet of “helper data” is stored with the encrypted key in what Poh calls a “registration artefact.”

The algorithms Poh refers to as the key-generating biometric cryptosystem (or “fuzzy extractor”) for encoding and key binding biometric cryptosystem (or “fuzzy vault scheme”) for decoding are governed by ISO/IEC 24745:2022 – Biometric information protection. The internet secret “does not correlate with biometrics” but, during the encoding process, is mixed with data from a biometric stable signal to create the Sketch – from which neither original piece of data can be derived.

When an additional biometric scan is mixed with the stable signal and the sketch, the internal secret can be decoded. Secure implementation requires liveness detection, post-quantum ready cryptography and cryptographic sharding of the sketch between a client and server, or what Poh calls a “split trust model.” Once the server shard is downloaded onto a device, it can be used offline – which, says Poh, can be especially useful for digital travel credentials.

In describing workflows for provisioning a second device and account recovery, Poh positions biometric-bound credentials as the next step in the evolution of secure, passwordless biometric authentication.

While FIDO2 passkeys are “very much device-specific,” making them vulnerable to “friendly fraud” by individuals who have access to a device, biometric bound credentials and the biometric cryptosystem model of Trust Stamp’s stable IT2 implementation offers privacy by design, enable sharable passkeys and ensure “genuine presence” – which Poh compares to World’s clumsily named “proof of human” model – using a secure ZKP protocol.

In summary, says Poh, the system “addresses account recovery, can perform offline authentication, enables ZKP of human presence and is device agnostic.”

More on the EAB Member Lunch Talk series can be found here.

Related Posts

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Ambitious biometrics projects need clear roles for success

Biometrics technology development has long been the fixed domain of experts, and while public bodies like NIST have played a…

 

Who holds the keys to digital sovereignty? It might not be who you think

As governments think more about digital identity as a pillar of digital public infrastructure, and therefore a matter of vital…

 

Nigeria wades into social media age assurance debate with pubic survey

A survey has been released by the Nigerian Data Protection Commission to gather feedback on the proposed regulation of a…

 

Spain’s Digital Transformation Ministry backs Sybol with €500k

A Spanish digital transformation agency is helping to fund digital identity development and verifiable credentials. The Spanish Society for Technological…

 

Ethiopia’s digital ID joins sovereign wealth fund as weekly enrollments reach 1M

Ethiopia is accelerating its efforts to reach 90 million digital ID enrollments this year, with the National ID Program (NIDP)…

 

Vendors push deeper into high assurance identity verification

Digital identity vendors are accelerating product integrations as businesses look for stronger, more seamless ways to verify users across sectors….

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events